Continued strong balance sheet with quarter-end cash and investments at $5.29 per share

Pericom Semiconductor Corporation (NASDAQ: PSEM), a worldwide supplier of high performance connectivity and timing solutions, today announced results for its fiscal 2013 second quarter ended December 29, 2012.

Net revenues for the second quarter were $30.4 million, a decrease of 17% from the $36.7 million reported in the first quarter, and a decrease of 0.2% from the $30.5 million reported in the comparable period last year.

GAAP gross margin was 36.8% in the second quarter, a decrease from 37.9% last quarter and an increase from 36.0% in the comparable period last year. On a non-GAAP basis, gross margin was 38.5% in the second quarter, which reflects exclusion of share-based compensation, amortization of intangible assets and amortization of fair value adjustments on acquired fixed assets. The comparable non-GAAP gross margins were 39.3% last quarter and 37.3% in the comparable period last year. The improvement in gross margin from the prior year primarily reflects favorable product mix from our focus on higher margin opportunities in networking and telecom, server, storage, and embedded end-market segments. The sequential decline in gross margin primarily reflects increased underutilization expenses in the current quarter.

GAAP net loss for the second quarter was $5.3 million, or $0.23 per diluted share, compared with net income of $1.2 million, or $0.05 per diluted share in the first quarter, and net loss of $0.3 million, or $0.01 per diluted share in the comparable period last year. GAAP net income for all periods included share-based compensation, amortization of intangible assets, and amortization of fair value adjustments, and the current quarter also included a $5.0 million tax provision resulting from intercompany transactions completed in the implementation of an operating structure to more efficiently align our transaction flows with our geographic business operations. Excluding these items, non-GAAP net income for the second quarter was $0.9 million, or $0.04 per diluted share, compared with non-GAAP net income of $2.5 million or $0.10 per diluted share in the first quarter, and non-GAAP net income of $1.0 million, or $0.04 per diluted share in the comparable period last year.

The balance sheet remained very strong with cash and cash equivalents and investments in marketable securities of $124 million or $5.29 per diluted share at the end of the second quarter. Inventories decreased $1.4 million on a sequential basis to $16.1 million, which represents 78 days of supply based on non-GAAP cost of revenues. Trade accounts receivable decreased by $4.7 million sequentially to $19.8 million, which represents DSO of 59 days. At quarter-end, working capital was $119 million and the current ratio was 6.4.

"While our second quarter results reflected continued economic softness in global markets, we were able to maintain improved gross margins driven by market segments and product mix that aligned with our strategic focus," said Alex Hui, President and CEO of Pericom. "The industry continues to face challenging times, yet we remain focused on our long-term growth strategy of expanding our customer base in server, networking, embedded and other high-margin applications for our high speed serial connectivity and timing products."

New Products

In the second quarter of fiscal 2013, Pericom introduced a total of 23 new products in our Connectivity, Timing, and Signal Integrity product areas.

We introduced 13 new products across our Connectivity product families targeting networking, server, storage, embedded, notebook/tablet, and consumer market segments. These included an HDMI switch, a new family of Microprocessor Supervisors ("MPS"), and a new family of Universal Level Shifters ("ULS"). All of these products were sampled to key customers during the quarter.

We expanded our Timing solutions for next generation platforms with 6 new products, including embedded clocks, a new family of ultra low jitter buffers, and a PCIe clock generator. These products target mainly networking, storage, server and embedded segments.

For Signal Integrity, we introduced 4 new ReDriver products targeting USB3 applications in notebook, server, storage, and networking applications, and a very low power PCIe GEN2 ReDriver for servers and computing.

Share Repurchase Update

On April 26, 2012 the Board authorized a repurchase program for up to $25 million of shares of our common stock. Pursuant to this authorization, the Company repurchased 150,201 shares in the three months ended December 29, 2012 for an aggregate cost of $1.1 million and an average per share purchase price of $7.47. The remaining balance of potential share repurchases under the authorization is approximately $23.9 million. Shares may be repurchased from time to time in the open market or through private transactions, at the discretion of Pericom management. As of January 25, 2013, Pericom had approximately 23.5 million shares of common stock outstanding.

Fiscal Q3 2013 Outlook

The following statements are based on current expectations. These statements are forward looking, and actual results may differ materially.

CIO, CTO & Developer Resources

Below are the estimates for fiscal Q3 2013.

Revenues in the second fiscal quarter are expected to be in the range of $27.5 million to $30.5 million.

GAAP gross margins are expected to be between 34.1% and 36.6%, and adjusting for share-based compensation, amortization of intangibles and fair value adjustments that are expected to total approximately 1.9%, non-GAAP gross margins are expected to be in the 36.0% to 38.5% range.

GAAP operating expenses are expected to be between $12.5 million and $12.9 million, and adjusting for share-based compensation, amortization of intangibles and fair value adjustments that are expected to total approximately $1.2 million, non-GAAP operating expenses are expected to be in the range of $11.3 million to $11.7 million.

Other income is expected to be between $0.6 million and $0.8 million on a GAAP basis and on a non-GAAP basis.

The effective tax rate is expected to be approximately 30-34% on a GAAP basis, and 30-32% on a non-GAAP basis.

Conference Call

The press release will be followed by a conference call beginning at 1:30 p.m. Pacific time on January 29, 2013. To listen to the call, dial (877) 377-7103 and reference "Pericom". A slide presentation will accompany the conference call. To view the slides, please visit the investor relations section of www.pericom.com.

The Pericom financial results conference call will be available via a live webcast on the investor relations section of the web site at http://www.pericom.com. Access the web site 15 minutes prior to the start of the call to download and install any necessary audio software. An archived webcast replay will be available on the web site for approximately 90 days.

A taped replay of the conference call will be made available for the period from this evening through midnight on Monday, February 4th. To listen to the replay, dial toll-free (855) 859-2056 and reference conference ID 91148924.

About Pericom

Pericom Semiconductor Corporation (NASDAQ: PSEM) enables serial connectivity with the industry's most complete solutions for the computing, communications, consumer and embedded market segments. Pericom's analog, digital and mixed-signal integrated circuits, along with its frequency control products are essential in the timing, switching, bridging and conditioning of high-speed signals required by today's ever-increasing speed and bandwidth demanding applications. Company headquarters is in San Jose, California, with design centers and technical sales and support offices globally. Pericom and the Pericom logo are trademarks or registered trademarks of Pericom Semiconductor Corp in the U.S. and/or other countries. Our website is http://www.pericom.com.

Non-GAAP Financial Information

In addition to disclosing financial results calculated in accordance with U.S. generally accepted accounting principles (GAAP), this announcement of operating results contains non-GAAP financial measures that exclude the income statement effects of share-based compensation, amortization of intangible assets, fair value adjustments of acquired inventory, a tax provision on intercompany transactions and the effects of excluding share-based compensation upon the number of diluted shares used in calculating non-GAAP earnings per share.

We have excluded share-based compensation expense in calculating these non-GAAP financial measures. These expenses are non-cash in nature and rely on valuations of the future market price of our common stock that is difficult to predict and is affected by market factors that are largely not within the control of management. We have excluded amortization of intangible assets, amortization of the fair value adjustments related to acquired inventory, tax on an intercompany transaction and the corresponding tax effects of these adjustments because we do not consider them to be related to our core operating performance. We also use non-GAAP data in calculating certain metrics such as non-GAAP cost of revenues in computing inventory days of supply.

We use the non-GAAP financial measures that exclude these items to make strategic decisions, forecast future results and evaluate the Company's current operating performance. We believe that the presentation of non-GAAP financial measures that exclude these items is useful to investors because we do not consider these charges either part of the day-to-day business or reflective of the core operational activities of the Company that are within the control of management or that are used to evaluate the Company's operating performance.

The non-GAAP financial measures disclosed by the Company should not be considered a substitute for, or superior to, financial measures calculated in accordance with GAAP, and the financial results calculated in accordance with GAAP and reconciliations to those financial statements should be carefully evaluated. The non-GAAP financial measures used by the Company may be calculated differently from, and therefore may not be comparable to, similarly titled measures used by other companies. The Company has provided reconciliations of the non-GAAP financial measures to the most directly comparable GAAP financial measures.

Safe Harbor Statement

This press release contains forward-looking statements as defined under The Securities Litigation Reform Act of 1995. Forward-looking statements in this release include the statements under the captions "Fiscal Q3 2013 Outlook", which regard the anticipated revenues, gross margin, operating expenses, other income, and effective tax rate in the third fiscal quarter of 2013, and statements from our CEO regarding challenging times for the industry and other future expectations. The Company's actual results could differ materially from what is set forth in such forward-looking statements due to a variety of risk factors, including softness in demand for our products, price erosion for certain of our products, unexpected difficulties in developing new products, customer decisions to reduce inventory, economic or financial difficulties experienced by our customers, or technological and market changes. All forward-looking statements included in this document are made as of the date hereof, based on information available to the Company as of the date hereof, and Pericom assumes no obligation to update any forward-looking statements. Parties receiving this release are encouraged to review our annual report on Form 10-K for the year ended June 30, 2012, our quarterly report on Form 10-Q for the quarter ended September 29, 2012, and in particular, the risk factors section contained in those reports.

"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.

In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lead...

Video experiences should be unique and exciting! But that doesn’t mean you need to patch all the pieces yourself.
Users demand rich and engaging experiences and new ways to connect with you. But creating robust video applications at scale can be complicated, time-consuming and expensive. In his session at @ThingsExpo, Zohar Babin, Vice President of Platform, Ecosystem and Community at Kaltura, discussed how VPaaS enables you to move fast, creating scalable video experiences that reach your aud...

"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.

What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...

An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen.
In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, discussed recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model for ...

IoT is rapidly changing the way enterprises are using data to improve business decision-making. In order to derive business value, organizations must unlock insights from the data gathered and then act on these. In their session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, and Peter Shashkin, Head of Development Department at EastBanc Technologies, discussed how one organization leveraged IoT, cloud technology and data analysis to improve customer experiences and effici...

Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation.
In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...

The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location.
With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...

You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time.
In his session at 19th Cloud Expo, Mark Allen, General Manager of...

The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...

As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...

Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...

"Dice has been around for the last 20 years. We have been helping tech professionals find new jobs and career opportunities," explained Manish Dixit, VP of Product and Engineering at Dice, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.

Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases.
In his general session at @ThingsExpo, Dave McCarthy, Director of Products...

"ReadyTalk is an audio and web video conferencing provider. We've really come to embrace WebRTC as the platform for our future of technology," explained Dan Cunningham, CTO of ReadyTalk, in this SYS-CON.tv interview at WebRTC Summit at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.

Businesses and business units of all sizes can benefit from cloud computing, but many don't want the cost, performance and security concerns of public cloud nor the complexity of building their own private clouds. Today, some cloud vendors are using artificial intelligence (AI) to simplify cloud deployment and management. In his session at 20th Cloud Expo, Ajay Gulati, Co-founder and CEO of ZeroStack, will discuss how AI can simplify cloud operations. He will cover the following topics: why clou...

The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT.
In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Dave McCarthy, Director of Products at Bsquare Corporation; Alan Williamson, Principal...

WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.

"At ROHA we develop an app called Catcha. It was developed after we spent a year meeting with, talking to, interacting with senior citizens watching them use their smartphones and talking to them about how they use their smartphones so we could get to know their smartphone behavior," explained Dave Woods, Chief Innovation Officer at ROHA, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.

For large enterprise organizations, it can be next-to-impossible to identify attacks and act to mitigate them in good time. That’s one of the reasons executives often discover security breaches when an external researcher — or worse, a journalist — gets in touch to ask why hundreds of millions of logins for their company’s services are freely available on hacker forums.
The huge volume of incoming connections, the heterogeneity of services, and the desire to avoid false positives leave enterprise security teams in a difficult spot. Finding potential security breaches is like finding a tiny ne...

When was the last time you’ve ever heard anyone say “IT Applications & Operations”? Frankly, in my 30+ year career in IT, I don’t believe I’ve ever heard anyone use this term. The typical term we hear is IT Infrastructure & Operations. These two go together like Peanut Butter and Jelly, which tells us a lot about how we view the field of IT. For those that may not be familiar with the role of IT Operations, Joe Hertvik does a great job here of describing IT Operations Management as someone engaged in the role of providing this service to the business. As you can see it’s very interesting how ...

Information self-service is undoubtedly one of the main drivers of Modern Data Management. From “data services marketplaces” to “self-service Big Data analytics,” one of the objectives of most data-related initiatives today is to provide business professionals with new ways to solve their information needs with the goals of achieving self-reliance and minimizing the IT bottleneck. However, is it realistic to expect business users to assume this job?
Studies [1] report that more than 60 percent of companies grade their experience with self-service initiatives as “average” or lower, with nearl...

Monitoring of Docker environments is challenging. Why? Because each container typically runs a single process, has its own environment, utilizes virtual networks, or has various methods of managing storage. Traditional monitoring solutions take metrics from each server and applications they run. These servers and applications running on them are typically very static, with very long uptimes. Docker deployments are different: a set of containers may run many applications, all sharing the resources of one or more underlying hosts. It's not uncommon for Docker servers to run thousands of short-te...

The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location.
With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal today!

We've come across a lot of talk about "cloud-native" apps lately. (They even have their own foundation!) Developers build these apps specifically to run on a cloud-based infrastructure, with the kind of user interface we all expect from our apps now. Cloud-native applications are scalable, usable and flexible, usually packaged using containers.
It's a step further in the cloud computing journey, and a step away from the way we used to conceive of apps. Application development happened for many years inside an IT bubble, with a long development and deployment lifecycle. They were used only i...

The IoT continued its toddler-like growth and stumbles in 2016. Here are five trends to look for in 2017 as the IoT enters its adolescence and how to benefit from them.
1. Ecosystems begin to determine winners and losers
Previously these were nice in-the-future concerns; now they will really count. Filling out a whole product value proposition through partnerships has repeatedly proven its importance across B2B and enterprise software sectors. In the IoT, they will be even more critical.

Cloud Expo, Inc. has announced today that Andi Mann returns to 'DevOps at Cloud Expo 2017' as Conference Chair
The @DevOpsSummit at Cloud Expo will take place on June 6-8, 2017, at the Javits Center in New York City, NY.
"DevOps is set to be one of the most profound disruptions to hit IT in decades," said Andi Mann. "It is a natural extension of cloud computing, and I have seen both firsthand and in independent research the fantastic results DevOps delivers. So I am excited to help the great team at @DevOpsSummit and Cloud Expo tell the world how they can leverage this emerging disruptive tr...

The time of year when crystal balls get a viewing and many pundits put out their annual predictions for the coming year. Rather than thinking up my own, I figured I’d regurgitate what many others are expecting to happen.
8 Predictions About How the Security Industry Will Fare in 2017 – An eWeek slideshow looking at areas like IoT, ransomware, automated attacks and the security skills shortage in the industry. Chris Preimesberger (@editingwhiz), who does a monthly #eweekchat on twitter, covers many of the worries facing organizations.

I recently recovered from ACDF surgery where they remove a herniated or degenerative disc in the neck and fuse the cervical bones above and below the disk. My body had a huge vulnerability where one good shove or fender bender could have ruptured my spinal cord. I had some items removed and added some hardware and now my risk of injury is greatly reduced.
Breaches are occurring at a record pace, botnets are consuming IoT devices and bandwidth, and the cloud is becoming a de-facto standard for many companies. Vulnerabilities are often found at the intersection of all three of these trends, so ...

In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain.
Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settlement products to hedge funds and investment banks. After, he co-founded a revenue cycle management...

We have been seeing a sudden rise in the deployment of Artificial Intelligence (AI), Machine Learning (ML), and Deep Learning (DL). It looks like the long “AI winter” is finally over. It is interesting to note that AI was mentioned by Alan Turing in a paper he wrote back in 1950 to suggest that there is possibility to build machines with true intelligence. Then in 1956, John McCarthy organized a conference at Dartmounth and coined the phrase Artificial Intelligence. Much of the next three decades did not see much activity and hence the phrase “AI Winter” was coined. Around 1997, IBM’s Deep Blu...

Nerdio is an IT-as-a-service platform with virtual desktop infrastructure (VDI) technology at its core. It is designed for IT departments that need a way to easily manage their ever-increasing workloads. Nerdio allows users to efficiently manage their complete IT environments by giving them full visibility and control of users’ desktops. In addition to virtual desktops, the platform includes unlimited virtual servers, Microsoft Office 365 security, and disaster recovery and 24/7/365 support.

Reality itself is going through a digital transformation thanks to leaps in 3D rendering and the crunch-speed motion feedback data. Although the modern definition of virtual reality (VR) has been making promises for three decades, the emphasis was always on the potential. Now it’s here. This is a tour of the state of VR in 2016 and where developers are taking it as VR spreads far beyond the world of gaming.

My daughter called with a frantic message. She was driving my car (why she was driving my car when she has her own is the subject for another time) and a warning message appeared on the car console: “Engine overheated! Stop engine and allow to cool down” (see Figure 1).
Fortunately, my daughter was nearly home, so she got the car home, shut it down and called me immediately (I was on the road somewhere…Washington DC, Philadelphia, Knoxville, Chicago, Toronto…I don’t even remember where anymore). I called my trusty mechanic (Chuck) and he was able to work my car into the schedule when I got ba...

Cloud computing budgets worldwide are reaching into the hundreds of billions of dollars, and no organization can survive long without some sort of cloud migration strategy. Each month brings new announcements, use cases, and success stories.